As cybercrime surges, experts call zero trust a must for Indian BFSI

Speaking at Business Standard's BFSI Summit, experts highlighted the need for a zero-trust approach, calling it a critical requirement

Malcolm Gomes, COO IDfy Mahavir Jindal, chief operations officer, Amazon Pay India,  Deep Narayan Mukherjee, Partner, Boston Consulting Group (BCG)
Malcolm Gomes, COO IDfy Mahavir Jindal, chief operations officer, Amazon Pay India, Deep Narayan Mukherjee, Partner, Boston Consulting Group (BCG)
Swati Gandhi New Delhi
3 min read Last Updated : Oct 30 2025 | 5:40 PM IST

Don't want to miss the best from Business Standard?

Data from the Ministry of Home Affairs showed that Indians lost ₹23,000 crore to financial fraud last year. The country also witnessed a staggering 42 per cent jump in reported cybercrimes over the same period.
 
At the Business Standard BFSI Insight Summit 2025, during a panel discussion titled “Trust No One, Verify Everything: Cybersecurity for the Digital Age,” experts agreed on the urgent need for a zero-trust approach — a model now seen as essential for securing digital ecosystems as regulators demand greater operational transparency.
 
A zero-trust model treats every user and device as untrusted, requiring continuous verification before granting access to systems or data.
 

Zero trust has been around for a while: Malcolm Gomes

 
According to Malcolm Gomes, Chief Operating Officer, IDfy, the concept of zero trust has existed for some time. “It started with the NIST in the US, and the thought process came from there. At this point, regulators have not mandated it, but it has crept into the thought process of organisations,” he said.
 
Mahavir Jindal, Chief Operations Officer, Amazon Pay India, agreed that zero trust is not a new concept. “If someone is in a financial services business, they have to operate in a zero-trust environment,” he said, adding that for him, zero trust is “all-pervasive.”
 

Cybersecurity shifting from perimeter defence to verification models

 
According to Deep Narayan Mukherjee, Partner, Boston Consulting Group (BCG), cybersecurity used to be “perimeter dependent,” meaning that external requests to internal servers required verification. Under zero-trust architecture, however, it no longer matters whether a user is inside or outside the organisation — all must go through the same level of authentication and verification.
 

Zero trust a critical requirement: Deep Mukherjee

 
Mukherjee explained that in most cyberattacks, the breach begins with phishing, after which malware infiltrates and spreads through the system. “With a zero-trust architecture, if there is an exfiltration attempt, the activity would be detected and blocked immediately,” he said.
 

Threat vectors evolving at a rapid scale: Mahavir Jindal

 
Jindal noted that threat vectors are evolving rapidly and that zero-trust capabilities must advance in tandem. He explained that at Amazon Pay, “any data exchange, whether with an external partner or an internal one, happens in a zero-trust environment — implying an exchange of keys.”
 
While he believes the industry is doing a decent job implementing zero-trust systems, Jindal warned that the pace of cyber threats continues to accelerate. “While we have a good foundation, there is a long way to go to address the emerging threat vectors,” he said.
*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

Topics :Business Standard BFSI SummitcybercrimesBFSIBS Web Reports

First Published: Oct 30 2025 | 5:40 PM IST

Next Story